6533b873fe1ef96bd12d4d4d

RESEARCH PRODUCT

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

Sidi-mohammed SenouciAbdelwahab BoualouacheSamira Moussaoui

subject

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)

description

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing strategy for VANETs is still an open issue. In this paper, we present a comprehensive survey and classification of pseudonym changing strategies. We then discuss and compare them with respect to some relevant criteria. Finally, we highlight some current researches, and open issues and give some future directions.

http://arxiv.org/abs/1704.00679